Docs/Scoring & Maturity

Scoring & Maturity

How PipeGuard calculates dual scores and maps them to DevSecOps maturity levels.

Dual Scoring System

PipeGuard calculates two independent scores for each scanned file:

ScoreRangeWhat It Measures
Security Score0 — 100Presence of security stages, secret management, vulnerability scanning, deployment gates, governance
Quality Score0 — 100Pipeline reliability, caching, retries, naming conventions, artifact management, structure

Both scores start at 100 and are deducted based on violations found. Each rule has a point deduction value based on its severity.

Point Deductions

SeverityDeductionExample
CRITICAL3 — 5 ptsHardcoded secrets, no secret scanning, FROM :latest
HIGH2 — 3 ptsNo Vault integration, npm install instead of npm ci
MEDIUM1 — 2 ptsMissing cache, no retry on flaky stages
LOW1 ptNaming conventions, missing comments
INFO0 ptsBest practice suggestions (informational only)

Scores never go below 0. A file with many critical violations will score 0/100.

Score Types per Rule

Each rule deducts from either Security or Quality:

CategoryDeducts From
SEC (Secret Management)Security
SAS (Static Analysis)Security
SCA (Supply Chain)Security
DST (Dynamic Testing)Security
DEP (Deployment)Security
GOV (Governance)Security
JEN (Jenkinsfile)Security
DOC (Dockerfile)Security
PQL (Quality)Quality

Maturity Levels

The Security Score maps to a DevSecOps maturity level (0-5):

LevelNameScore RangeDescription
0None0 — 19No security stages. Pipeline is completely unprotected.
1Basic20 — 39Some security tools present but not blocking. Reports generated but not acted on.
2Developing40 — 59Security stages exist and some block. Major gaps remain in coverage.
3Defined60 — 79Defense in depth partially implemented. Most critical checks in place.
4Managed80 — 94Strong security posture. Centralized tracking, governance enforced.
5Optimized95 — 100Full DevSecOps maturity. Audit-ready. Top 1% of organizations.

Example Output

terminal-------------------------------------------------------------------- RESULTS -------------------------------------------------------------------- Files scanned: 4 Violations: 161 (16 critical, 35 high, 90 medium, 20 low) Auto-fixable: 150/161 .gitlab-ci.yml SECURITY 9/100 Level 0 — None QUALITY 41/100 Level 2 — Developing Dockerfile SECURITY 40/100 Level 2 — Developing Jenkinsfile SECURITY 59/100 Level 2 — Developing

Improving Your Score

Use --fix to see exactly what to change:

shell$ pipeguard scan . --fix --severity critical,high

Focus on critical violations first — they have the highest point deductions. A single hardcoded secret (R03) costs 5 points.

Tip: Run PipeGuard in CI and track your score over time. A score of 80+ (Level 4: Managed) is a strong target for production pipelines.